Vulnerability
Code Rules in Vulnerability category
Category | Severity | Name | Description |
---|---|---|---|
|
|
|
SHA-1 and Message-Digest hash algorithms should not be used in secure contexts |